Three Buddy Problem

Three Buddy Problem

https://feeds.fireside.fm/securityconversations/rss
15 Followers 212 Episodes Claim Ownership
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, c...
View more

Episode List

Google's Cyber Disruption Unit; Coruna is Triangulation, US Bans Foreign-Made Routers

Mar 28th, 2026 7:30 PM

(Presented by TLPBLACK: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.) Three Buddy Problem - Episode 91: This week we dig into Google's new cyber threat disruption unit announced at RSAC, Kaspersky confirming Coruna is a direct evolution of Operation Triangulation, and a cascading supply chain compromise that chained through LiteLLM, Trivy, and Checkmarx into thousands of software pipelines. Plus, VCs and the breathless AI hype, Apple's iOS 26.4 and silent patches, the FCC's ban on foreign-made routers, and Symantec catching an APT looking for Chinese military data. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu. 0:00 Intro & Pre-Show Banter 3:08 JAGS in San Francisco: RSAC week recap 6:05 Google Launches Cyber Disruption Unit — What's Actually New? 13:43 Why Separate Disruption Units Matter: ROI & Budget Justification 29:11 Haroon Meer's RSA Reality Check: The AI Hype Machine 32:37 The VC Ponzi Cycle & How Easy Money Hollowed Out Cybersecurity 47:32 ENT.ai & Tenex AI Hackathon at RSAC 53:08 Kaspersky Links Corona Exploit Kit to Operation Triangulation 1:08:09 Trenchant Cleanup & Lessons from Equation Group Burns 1:19:31 Apple iOS Patches, Hong Kong Device Passcode Law 1:27:53 Handala Hacks FBI Director Kash Patel's Personal Gmail 1:37:32 LeakBase Admin "Chucky" Arrested in Russia — FSB Gets the Data 1:45:38 Supply Chain Attacks: TeamPCP Hits LiteLLM & Trivy 2:04:34 FCC Bans Foreign-Made Routers — But What Do We Buy?Links:TranscriptTLPBLACK SolutionsGoogle launches threat disruption unit at RSACWhite House downplays cyber ‘letters of marque’ speculationHaroon Meer on RSAC 2026Kaspersky on Coruna/Triangulation ConnectionApple Security Bulletin - iOS 26.4Reverse engineering Apple’s silent security fixesNew Hong Kong Law on Phone/Laptop PasswordsIran-linked hackers breach FBI director's personal emailUS DOJ Disrupts Iranian Cyber Enabled Psychological OperationsOfficial Statement on Stryker Network DisruptionRussia arrests Leakbase adminTrivy ecosystem supply chain compromised (Advisory)Self-propagating malware poisons open source software and wipes Iran-based machinesNew Malware Targets Users of Cobra DocGuard SoftwareFCC bans 'foreign made' consumer routers (PDF)

The greatest APT hunter of all time, Apple's exploit kit problem, Microsoft FedRAMP mess

Mar 20th, 2026 8:00 PM

(Presented by Thinkst Canary: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.) Three Buddy Problem - Episode 90: We remember GReAT teammate Sergey Mineev, the legendary malware hunter behind discoveries like Equation Group and Project Sauron (Remsec), including stories about his methods and why he was the best to ever do it. Plus, another in-the-wild iOS exploit kit discovery and a long overdue conversation about Apple's responsibility to hundreds of millions of users on older iOS versions; the ProPublica Microsoft/FedRAMP bombshell, Interlock ransomware sitting on a Cisco zero-day, the White House AI policy framework, and Supermicro co-founder $2.5 billion AI chip smuggling bust. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.Links:Transcript Thinkst CanaryEquation Group: The Crown Creator of Cyber-EspionageThe Project Sauron APTGoogle: The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat ActorsiVerify: Inside DarkSword - A New iOS Exploit Kit Delivered Via Compromised Legitimate WebsitesLookout: Attackers Wielding DarkSword Threaten iOS UsersApple statement on Coruna, DarkSwordAmazon discovers Interlock ransomware hitting enterprise firewallsCisco Secure Firewall Management Center RCE FlawCISA Urges Endpoint Management System Hardening After Stryker AttackStryker statements on wiper network disruptionFederal Cyber Experts Thought Microsoft’s Cloud Was “a Pile of Shit.” They Approved It Anyway.White House Unveils National AI Legislative FrameworkSupermicro Founder Charged with Diverting AI tech to ChinaNEBULA:FOG 2026 | AI x Security Hackathon

Handala wiper attacks, APT28 implant devs are back, Signal's verification problems

Mar 14th, 2026 12:00 AM

(Presented by TLPBLACK: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.) Three Buddy Problem - Episode 89: We discuss Iran hacktivist group 'Handala' wiper attacks against US medical device maker Stryker, Microsoft Intune MDM tool abuse, and whether Iran's cyber retaliation is as scary as the headlines suggest. Plus, ESET's discovery that Russia's APT28 original implant developers are back after years of silence, Dutch intelligence warnings on Russian campaigns targeting Signal and WhatsApp accounts, Apple finally patching Coruna exploit kit vulnerabilities for older iPhones, and Google sharing Coruna samples that raise new questions about the exploit kit's proliferation chain. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.Links:Transcript (raw, AI-generated)TLPBLACK SolutionsKim Zetter: Iranian Hacktivists Strike Medical Device Maker Stryker in "Severe" Attack that Wiped SystemsStryker Cyberattack Adds to Fears of New Front in Iran WarBloomberg: Cyberattack Hits Stryker; Pro-Iran Group Claims CreditWho is Handala? (Malpedia)Palo Alto: Increased Risk of Wiper AttacksCISA Advisories on Iran State-Sponsored Cyber ThreatRussia state actors targets Signal and WhatsApp accountsDutch intel report on Signal, WhatsApp targetingSignal responds to Dutch Intel reportESET: Resurgence of one of Russia’s most notorious APT groupsPoland says foiled cyberattack on nuclear centre may have come from IranApple ships iOS 16.7.15 to cover 'Coruna' exploitsApple iOS 15.8.7 covers 'Coruna' exploit kitDetection Engineering #148NEBULA:FOG 2026 | AI x Security HackathonEkoparty Miami (May 21-22, 2026)PIVOTcon Agenda

Trenchant, Peter Williams, and the proliferation of a Shadow Brokers-level iOS exploit framework

Mar 6th, 2026 7:30 PM

(Presented by Thinkst Canary: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.) Three Buddy Problem - Episode 88: We unpack the fallout from public documentation of the Coruna iOS exploit kit, the likely connection to the Peter Williams/Trenchant exploit sale to Russians, how it slipped from government hands into criminal use, and the widening use of zero-days by surveillance vendors and cybercriminals. Plus, fresh signs of cyber-warfare activity tied to Iran and Israel, the FBI’s disclosure of a breach affecting internal surveillance systems, and the latest debate over AI, security tooling, and Anthropic’s public stumbles. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.Links:Transcript (raw, AI-generated)Thinkst Canary (how it works)Coruna: The Mysterious Journey of a Powerful iOS Exploit KitiVerify Details First Known Mass iOS AttackMatthias Frielingsdorf on the mysterious Coruna iOS exploit kit discoveryMatthias Frielingsdorf on Coruna (raw transcript)Coruna-related hashes on VirusTotalKaspersky: No signs Coruna iPhone exploit kit made by USAzimuth unlocked the San Bernardino shooter’s iPhone for the FBI2025 Zero-Days in Review (Google)FBI investigating ‘suspicious’ cyber activities on critical surveillance networkIranian Hacking Groups Go Dark Amid US, Israeli Military StrikesInterplay between Iranian Targeting of IP Cameras and Physical WarfareIsrael says it knocked out Iran’s cyber warfare headquartersAmazon Bahrain facility targeted for U.S. military supportFull transcript of Anthropic CEO Dario Amodei interviewCodex Security (formerly Aardvark) now in research previewNEBULA:FOG 2026 | AI x Security Hackathon

Matthias Frielingsdorf on the mysterious Coruna iOS exploit kit discovery

Mar 5th, 2026 11:00 PM

(Presented by TLPBLACK: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.) Matthias Frielingsdorf (co-founder and VP of Research at iVerify) joins the show to discuss the mysterious US government connection to 'Coruna', an iOS exploit kit fitted with 23 exploits across five full chains targeting iPhones iOS 13 through 17.2.1. We talk about a "gut feeling" connecting this to the L3 Trenchant/Peter Williams exploit sale scandal, how a nation-state-grade exploit kit ended up in the hands of a Chinese cybercrime group chasing crypto wallets, and what it means that criminal organizations are now deploying iPhone zero-days at scale. Matthias walks through what iVerify can and can't do on Apple's locked-down platform, why he thinks Apple needs to give defenders more access, the Lockdown Mode debate, the thorny issue of sample sharing in the research community, and practical advice for everyday iPhone users facing a threat landscape that just got a lot more complicated.Links:Coruna: The Mysterious Journey of a Powerful iOS Exploit KitiVerify Details First Known Mass iOS AttackCoruna: Inside the Nation-State-Grade iOS Exploit Kit (iVerify)Wired: A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and CriminalsLockdown Mode or Nothing Zero-day reality check: iOS exploitation About Lockdown Mode (Apple)Charlie Miller on hacking iPhones, MacbooksTLPBLACK

Get this podcast on your phone, Free

Create Your Podcast In Minutes

  • Full-featured podcast site
  • Unlimited storage and bandwidth
  • Comprehensive podcast stats
  • Distribute to Apple Podcasts, Spotify, and more
  • Make money with your podcast
Get Started
It is Free